Compliance & Security

AxiaTP Compliance and Standards

The AxiaTP Difference is found in our NCS (Network, Compliance, Security) and PSP (Post Sale Process) standards in addition to our relentless commitment to quality service and value. Our professional staff has decades of implementation and process/work flow experience and our PSP is detailed, organized and tracked via interactive project management software. With complex regulations and standards, AxiaTP guarantees security and is a name you can trust.

SSAE16 – SOC 2 Compliant

“The purpose of a SOC 2 report is to evaluate an organization’s information systems relevant to security, availability, processing integrity, confidentiality or privacy of a system”

Federal Information Security Management Act (FISMA) Compliant

“Requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.”

Sarbanes Oxley (SOX) Compliant

“The SOX Act requires all financial reports to include an internal control report. This is designed to show that not only are the company’s financial data accurate, but the company has confidence in them because adequate controls are in place to safeguard financial data. Year-end financial reports must contain an assessment of the effectiveness of the internal controls.

CALEA Compliant

The Communications Assistance for Law Enforcement Act (CALEA) was enacted by Congress in 1994 to require telecommunications carriers to provide law enforcement with certain technical capabilities when they conduct lawful electronic surveillance on telecommunications networks. The Federal Communications Commission issued an order in 2005 extending the coverage of CALEA to two-way interconnected VoIP and broadband Internet access.

The goal of CALEA is to preserve the ability of law enforcement to conduct lawful investigations despite evolutions in network technology.This goal is meant to be achieved while protecting telecommunications subscriber privacy and the ability of telecommunications carriers to launch new services and technologies.